Please enable JavaScript to use CodeHS

OH 7: IC.SLE.7.a

CodeHS Lessons

Describe tradeoffs between allowing information to be public and keeping information private and secure to inform decision making.

Standard
2.6 Copyright
Standard
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
Standard
4.6 Ethics and Legal Considerations
6.4 Cybersecurity
6.5 The CIA Triad
7.1 Digital Footprint and Reputation
7.4 Privacy & Security
Standard
3.6 Ethics and Legal Considerations
5.1 Digital Footprint and Reputation
5.4 Privacy & Security
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
2.8 Copyright
Standard
9.1 Digital Footprint and Reputation
9.4 Privacy & Security
15.4 The CIA Triad
Standard
13.8 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.3 The CIA Triad
1.7 Privacy & Security
2.6 Copyright
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.4 The CIA Triad
4.5 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.3 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
1.6 Copyright
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
8.4 The CIA Triad
Standard
11.3 The CIA Triad
12.1 Digital Footprint and Reputation
12.4 Privacy & Security
Standard
1.4 The CIA Triad
21.4 Privacy & Security
21.1 Digital Footprint and Reputation
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
11.6 Copyright
8.4 Privacy & Security
16.4 The CIA Triad
8.1 Digital Footprint and Reputation
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
4.6 Copyright
Standard
2.1 Privacy & Security
Standard
5.2 The CIA Triad
5.3 Digital Footprint and Reputation
5.6 Privacy & Security
Standard
1.1 Digital Footprint and Reputation
1.4 Privacy & Security
3.6 Ethics and Legal Considerations
4.4 Cybersecurity
4.5 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
5.7 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
11.4 The CIA Triad
Standard
1.3 The CIA Triad
1.4 Digital Footprint and Reputation
1.7 Privacy & Security
Standard
1.5 The CIA Triad
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
Standard
9.3 The CIA Triad
Standard
1.1 Digital Footprint and Reputation
2.2 The CIA Triad
Standard
10.4 Privacy & Security
15.4 The CIA Triad
Standard
4.4 Privacy & Security
Standard
1.2 Digital Footprint and Reputation
1.5 Privacy & Security
Standard
1.4 The CIA Triad
2.4 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Privacy & Security
Standard
1.4 The CIA Triad
2.1 Digital Footprint and Reputation
2.4 Privacy & Security
Standard
1.2 The CIA Triad
1.3 Digital Footprint and Reputation
1.6 Privacy & Security
Standard
4.1 Digital Footprint and Reputation
4.4 Privacy & Security
6.6 Copyright
13.4 The CIA Triad
Standard
2.6 Copyright
Standard
2.6 Copyright
Standard
2.7 Ethics and Legal Considerations
4.4 Cybersecurity
4.5 The CIA Triad
6.1 Digital Footprint and Reputation
6.4 Privacy & Security
Standard
2.6 Copyright
Standard
2.6 Copyright
Standard
3.2 The CIA Triad
3.3 Digital Footprint and Reputation
3.6 Privacy & Security
Standard
3.6 Ethics and Legal Considerations
Standard
2.4 Cybersecurity
2.5 The CIA Triad
Standard
2.1 Digital Footprint and Reputation
2.4 Privacy & Security